CVE-2010-3695

Cross-site scripting (XSS) vulnerability in fetchmailprefs.php in Horde IMP before 4.3.8, and Horde Groupware Webmail Edition before 1.2.7, allows remote attackers to inject arbitrary web script or HTML via the fm_id parameter in a fetchmail_prefs_save action, related to the Fetchmail configuration.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0379.html Exploit
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598584 Exploit Patch
http://cvs.horde.org/diff.php/imp/docs/CHANGES?rt=horde&r1=1.699.2.424&r2=1.699.2.430&ty=h
http://git.horde.org/diff.php/groupware/docs/webmail/CHANGES?rt=horde&r1=1.35.2.11&r2=1.35.2.13&ty=h
http://git.horde.org/diff.php/imp/fetchmailprefs.php?rt=horde&r1=1.39.4.10&r2=1.39.4.11 Patch
http://lists.horde.org/archives/announce/2010/000558.html Patch
http://lists.horde.org/archives/announce/2010/000568.html
http://openwall.com/lists/oss-security/2010/09/30/7 Exploit Patch
http://openwall.com/lists/oss-security/2010/09/30/8 Exploit Patch
http://openwall.com/lists/oss-security/2010/10/01/6 Patch
http://secunia.com/advisories/41627 Vendor Advisory
http://secunia.com/advisories/43896 Vendor Advisory
http://securityreason.com/securityalert/8170
http://www.debian.org/security/2011/dsa-2204
http://www.securityfocus.com/archive/1/513992/100/0/threaded
http://www.securityfocus.com/bid/43515 Exploit
http://www.vupen.com/english/advisories/2010/2513 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0769 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=641069 Exploit Patch
http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0379.html Exploit
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598584 Exploit Patch
http://cvs.horde.org/diff.php/imp/docs/CHANGES?rt=horde&r1=1.699.2.424&r2=1.699.2.430&ty=h
http://git.horde.org/diff.php/groupware/docs/webmail/CHANGES?rt=horde&r1=1.35.2.11&r2=1.35.2.13&ty=h
http://git.horde.org/diff.php/imp/fetchmailprefs.php?rt=horde&r1=1.39.4.10&r2=1.39.4.11 Patch
http://lists.horde.org/archives/announce/2010/000558.html Patch
http://lists.horde.org/archives/announce/2010/000568.html
http://openwall.com/lists/oss-security/2010/09/30/7 Exploit Patch
http://openwall.com/lists/oss-security/2010/09/30/8 Exploit Patch
http://openwall.com/lists/oss-security/2010/10/01/6 Patch
http://secunia.com/advisories/41627 Vendor Advisory
http://secunia.com/advisories/43896 Vendor Advisory
http://securityreason.com/securityalert/8170
http://www.debian.org/security/2011/dsa-2204
http://www.securityfocus.com/archive/1/513992/100/0/threaded
http://www.securityfocus.com/bid/43515 Exploit
http://www.vupen.com/english/advisories/2010/2513 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0769 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=641069 Exploit Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:horde:imp:*:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.7:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.6:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0379.html - Exploit () http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0379.html - Exploit
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598584 - Exploit, Patch () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598584 - Exploit, Patch
References () http://cvs.horde.org/diff.php/imp/docs/CHANGES?rt=horde&r1=1.699.2.424&r2=1.699.2.430&ty=h - () http://cvs.horde.org/diff.php/imp/docs/CHANGES?rt=horde&r1=1.699.2.424&r2=1.699.2.430&ty=h -
References () http://git.horde.org/diff.php/groupware/docs/webmail/CHANGES?rt=horde&r1=1.35.2.11&r2=1.35.2.13&ty=h - () http://git.horde.org/diff.php/groupware/docs/webmail/CHANGES?rt=horde&r1=1.35.2.11&r2=1.35.2.13&ty=h -
References () http://git.horde.org/diff.php/imp/fetchmailprefs.php?rt=horde&r1=1.39.4.10&r2=1.39.4.11 - Patch () http://git.horde.org/diff.php/imp/fetchmailprefs.php?rt=horde&r1=1.39.4.10&r2=1.39.4.11 - Patch
References () http://lists.horde.org/archives/announce/2010/000558.html - Patch () http://lists.horde.org/archives/announce/2010/000558.html - Patch
References () http://lists.horde.org/archives/announce/2010/000568.html - () http://lists.horde.org/archives/announce/2010/000568.html -
References () http://openwall.com/lists/oss-security/2010/09/30/7 - Exploit, Patch () http://openwall.com/lists/oss-security/2010/09/30/7 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2010/09/30/8 - Exploit, Patch () http://openwall.com/lists/oss-security/2010/09/30/8 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2010/10/01/6 - Patch () http://openwall.com/lists/oss-security/2010/10/01/6 - Patch
References () http://secunia.com/advisories/41627 - Vendor Advisory () http://secunia.com/advisories/41627 - Vendor Advisory
References () http://secunia.com/advisories/43896 - Vendor Advisory () http://secunia.com/advisories/43896 - Vendor Advisory
References () http://securityreason.com/securityalert/8170 - () http://securityreason.com/securityalert/8170 -
References () http://www.debian.org/security/2011/dsa-2204 - () http://www.debian.org/security/2011/dsa-2204 -
References () http://www.securityfocus.com/archive/1/513992/100/0/threaded - () http://www.securityfocus.com/archive/1/513992/100/0/threaded -
References () http://www.securityfocus.com/bid/43515 - Exploit () http://www.securityfocus.com/bid/43515 - Exploit
References () http://www.vupen.com/english/advisories/2010/2513 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2513 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0769 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0769 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=641069 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=641069 - Exploit, Patch

Information

Published : 2011-03-31 22:55

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3695

Mitre link : CVE-2010-3695

CVE.ORG link : CVE-2010-3695


JSON object : View

Products Affected

horde

  • groupware
  • imp
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')